Artwork

Innhold levert av N2K Networks, Inc. and N2K Networks. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av N2K Networks, Inc. and N2K Networks eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

Stealth, command, exfiltrate: The three-headed cyber dragon of Crimson Palace.

30:46
 
Del
 

Manage episode 439177660 series 2925132
Innhold levert av N2K Networks, Inc. and N2K Networks. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av N2K Networks, Inc. and N2K Networks eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

Crimson Palace targets Asian organizations on behalf of the PRC. Europe’s AI Convention has lofty goals and legal loopholes. The NoName ransomware gang may be working as a RansomHub affiliate. Wisconsin Physicians Service Insurance Corporation, SLIM CD, and Acadian Ambulance Service each suffer significant data breaches. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities Catalog. Researchers from Ben-Gurion University in Israel develop new techniques to exfiltrate data from air-gapped computers. In our latest Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Sextortion scammers have gone to the dogs.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Ryan delves into the practical applications of AI in tasks such as OSINT analysis, payload development, and evading endpoint detection systems. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network.

Selected Reading

Chinese Tag Team APTs Keep Stealing Asian Gov't Secrets (Dark Reading)

The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats (SecurityWeek)

NoName ransomware gang deploying RansomHub malware in recent attacks (Bleeping Computer)

Wisconsin Insurer Discloses Data Breach Impacting 950,000 Individuals (SecurityWeek)

Payment Gateway SLIM CD Data Breach: 1.7 Million Users Impacted (HACKREAD)

Acadian Ambulance service is reporting data breach, exposing almost 3 Million people (Beyond Machines)

CISA Warns of Three Vulnerabilities That Are Actively Exploited in the Wild (Cyber Security News)

Researchers Detail Attacks on Air-Gapped Computers to Steal Data (Cyber Security News)

Sextortion scams now use your "cheating" spouse’s name as a lure (Bleeping Computer)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

Learn more about your ad choices. Visit megaphone.fm/adchoices

  continue reading

3055 episoder

Artwork
iconDel
 
Manage episode 439177660 series 2925132
Innhold levert av N2K Networks, Inc. and N2K Networks. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av N2K Networks, Inc. and N2K Networks eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

Crimson Palace targets Asian organizations on behalf of the PRC. Europe’s AI Convention has lofty goals and legal loopholes. The NoName ransomware gang may be working as a RansomHub affiliate. Wisconsin Physicians Service Insurance Corporation, SLIM CD, and Acadian Ambulance Service each suffer significant data breaches. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities Catalog. Researchers from Ben-Gurion University in Israel develop new techniques to exfiltrate data from air-gapped computers. In our latest Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Sextortion scammers have gone to the dogs.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Ryan delves into the practical applications of AI in tasks such as OSINT analysis, payload development, and evading endpoint detection systems. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network.

Selected Reading

Chinese Tag Team APTs Keep Stealing Asian Gov't Secrets (Dark Reading)

The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats (SecurityWeek)

NoName ransomware gang deploying RansomHub malware in recent attacks (Bleeping Computer)

Wisconsin Insurer Discloses Data Breach Impacting 950,000 Individuals (SecurityWeek)

Payment Gateway SLIM CD Data Breach: 1.7 Million Users Impacted (HACKREAD)

Acadian Ambulance service is reporting data breach, exposing almost 3 Million people (Beyond Machines)

CISA Warns of Three Vulnerabilities That Are Actively Exploited in the Wild (Cyber Security News)

Researchers Detail Attacks on Air-Gapped Computers to Steal Data (Cyber Security News)

Sextortion scams now use your "cheating" spouse’s name as a lure (Bleeping Computer)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

Learn more about your ad choices. Visit megaphone.fm/adchoices

  continue reading

3055 episoder

Alle episoder

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett